Re: [Xen-devel] [PATCH v3 2/4] x86: suppress SMEP and SMAP while running 32-bit PV guest code

2016-03-28 Thread Jan Beulich
>>> On 25.03.16 at 19:01, wrote: >> @@ -174,10 +174,61 @@ compat_bad_hypercall: >> /* %rbx: struct vcpu, interrupts disabled */ >> ENTRY(compat_restore_all_guest) >> ASSERT_INTERRUPTS_DISABLED >> +.Lcr4_orig: >> +ASM_NOP8 /* testb $3,UREGS_cs(%rsp) */ >> +ASM_NOP2 /* jp

[Xen-devel] [PATCH v4 2/4] libxl: add new pvusb backend "qusb" provided by qemu

2016-03-28 Thread Juergen Gross
Add a new pvusb backend type "qusb" which is provided by qemu. It can be selected either by specifying the type directly in the configuration or it is selected automatically by libxl in case there is no "usbback" driver loaded. Signed-off-by: Juergen Gross --- V4: bail out in case of usbback_is_l

[Xen-devel] [PATCH v4 1/4] libxl: make libxl__need_xenpv_qemu() operate on domain config

2016-03-28 Thread Juergen Gross
libxl__need_xenpv_qemu() is called with configuration data for console, vfbs, disks and channels today in order to evaluate the need for starting a device model for a pv domain. The console data is local to the caller and setup in a way to never require a device model. All other data is taken from

[Xen-devel] [PATCH v4 0/4] libxl: add support for qemu base pvusb backend

2016-03-28 Thread Juergen Gross
This patch series is meant to be applied on top of Chunyan's series to support pvusb in libxl. It is adding support for an alternative pvusb backend "qusb" via qemu. Changes in V4: - dropped patch 5 - patch 1: Return (negative) error value in case of failure, 0 or 1 else - patch 2: Bail out in ca

[Xen-devel] [PATCH v4 4/4] libxl: check for dynamic device model start required

2016-03-28 Thread Juergen Gross
Add a service routine checking whether a device model must be started after adding a device to a domain. Signed-off-by: Juergen Gross --- tools/libxl/libxl.c | 12 tools/libxl/libxl_dm.c | 22 ++ tools/libxl/libxl_internal.h | 4 tools/libxl/

[Xen-devel] [PATCH v4 3/4] libxl: add service function to check whether device model is running

2016-03-28 Thread Juergen Gross
Add an internal service function to check for a running device model. This can be used later when adding devices to a domain requiring a device model for either printing an error message or starting the device model in case it is not already running. Signed-off-by: Juergen Gross Acked-by: Wei Liu

Re: [Xen-devel] [PATCH] tools: fix xen-detect to correctly identify domU type

2016-03-28 Thread Jan Beulich
>>> On 25.03.16 at 09:54, wrote: > Another sum up: > > - common sense seems to be the current way xen-detect is trying to > guess the guest type is unreliable and should be dropped (Jan > would like to keep it, but I guess he just wants the information > to be available - is this correct, J

[Xen-devel] [ovmf test] 87789: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87789 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/87789/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543 test-amd64-amd64-xl-qemuu-ov

Re: [Xen-devel] [PATCH v2 0/2] usb, xen: add pvUSB backend

2016-03-28 Thread Juergen Gross
On 18/03/16 15:47, Juergen Gross wrote: > On 18/03/16 13:52, Gerd Hoffmann wrote: >> On Do, 2016-03-10 at 16:19 +0100, Juergen Gross wrote: >>> This series adds a Xen pvUSB backend driver to qemu. USB devices >>> connected to the host can be passed through to a Xen guest. The >>> devices are specif

Re: [Xen-devel] [PATCH v2 2/3] libxl: add new pvusb backend "qusb" provided by qemu

2016-03-28 Thread Juergen Gross
On 28/03/16 16:55, Konrad Rzeszutek Wilk wrote: > On Tue, Mar 22, 2016 at 08:29:22AM +0100, Juergen Gross wrote: >> Add a new pvusb backend type "qusb" which is provided by qemu. It can >> be selected either by specifying the type directly in the configuration >> or it is selected automatically by

[Xen-devel] [PATCH v3] arm: Fix asynchronous aborts (SError exceptions) due to bogus PTEs

2016-03-28 Thread Shanker Donthineni
From: Vikram Sethi ARMv8 architecture allows performing prefetch data/instructions from memory locations marked as normal memory. Prefetch does not mean that the data/instruction has to be used/executed in code flow. All PTEs that appear to be valid to MMU must contain valid physical address with

Re: [Xen-devel] [PATCH v2 3/3] libxl: add domain config parameter to force start of qemu

2016-03-28 Thread Juergen Gross
On 28/03/16 16:50, Konrad Rzeszutek Wilk wrote: > On Tue, Mar 22, 2016 at 08:29:23AM +0100, Juergen Gross wrote: >> Today the device model (qemu) is started for a pv domain only in case >> a device requiring qemu is specified in the domain configuration >> (qdisk, vfb, channel). If there is no such

Re: [Xen-devel] [PATCH v2] xen/arm64: check XSM Magic and Signature from the second unknown module.

2016-03-28 Thread Fu Wei
Hi Daniel, On 29 March 2016 at 06:08, Daniel De Graaf wrote: > On 03/28/2016 04:54 PM, Konrad Rzeszutek Wilk wrote: >> >> On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote: >>> >>> From: Fu Wei >>> >>> This patch add a check_xsm_signature static function for detecting XSM >>> fro

Re: [Xen-devel] [PATCH v2] xen/arm64: check XSM Magic and Signature from the second unknown module.

2016-03-28 Thread Fu Wei
Hi Konrad, On 29 March 2016 at 04:54, Konrad Rzeszutek Wilk wrote: > On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote: >> From: Fu Wei >> >> This patch add a check_xsm_signature static function for detecting XSM >> from the second unknown module. >> >> If xen can't get the kind

[Xen-devel] [PATCH v3] xen/arm64: check XSM Magic and Signature from the second unknown module.

2016-03-28 Thread fu . wei
From: Fu Wei This patch add a check_xsm_signature static function for detecting XSM from the second unknown module. If Xen can't get the kind of module from compatible, we guess the kind of these first two unknown respectively: (1) The first unknown must be kernel; (2) The second unknown

[Xen-devel] [xen-unstable test] 87739: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87739 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/87739/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-pair 21 guest-migrate/src_host/dst_host fail REGR. vs. 86491 test-amd64-i3

Re: [Xen-devel] pv-grub guest booting fail with recent qemu-xen

2016-03-28 Thread Hao, Xudong
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Konrad > Rzeszutek Wilk > Sent: Monday, March 28, 2016 9:21 PM > To: Hao, Xudong ; wei.l...@citrix.com; > samuel.thiba...@ens-lyon.org > Cc: xen-devel@lists.xen.org; stefano.stabell...@eu.citrix.com

Re: [Xen-devel] [PATCH v8 3/3] VT-d: Fix vt-d Device-TLB flush timeout issue

2016-03-28 Thread Xu, Quan
On March 28, 2016 10:11pm, Konrad Rzeszutek Wilk wrote: > > > > > > +list_del(&pdev->domain_list); > > > > +pdev->domain = NULL; > > > > +pci_hide_existing_device(pdev); > > > > +break; > > > > +} > > > > +} > > > > + > > > > +pcidevs

[Xen-devel] [qemu-mainline test] 87710: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87710 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/87710/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-i386 10 guest-start fail REGR. vs. 86454 test-amd64-i386-qem

Re: [Xen-devel] [PATCH v2] xen/arm64: check XSM Magic and Signature from the second unknown module.

2016-03-28 Thread Daniel De Graaf
On 03/28/2016 04:54 PM, Konrad Rzeszutek Wilk wrote: On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote: From: Fu Wei This patch add a check_xsm_signature static function for detecting XSM from the second unknown module. If xen can't get the kind of module from compatible, we g

Re: [Xen-devel] [PATCH v2] xen/arm64: check XSM Magic and Signature from the second unknown module.

2016-03-28 Thread Konrad Rzeszutek Wilk
On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote: > From: Fu Wei > > This patch add a check_xsm_signature static function for detecting XSM > from the second unknown module. > > If xen can't get the kind of module from compatible, we guess the kind of > these first two unknown r

Re: [Xen-devel] [PATCH v4 24/26] tools/libxc: Wire a featureset through to cpuid policy logic

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:27PM +, Andrew Cooper wrote: > Later changes will cause the cpuid generation logic to seed their information s/Later changes/Patch titled tools/libxc: Use featuresets rather than guesswork > from a featureset. This patch adds the infrastructure to specify a > fe

Re: [Xen-devel] [PATCH v4 23/26] tools: Utility for dealing with featuresets

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:26PM +, Andrew Cooper wrote: > It is able to reports the current featuresets; both the static masks and > dynamic featuresets from Xen, or to decode an arbitrary featureset into > `/proc/cpuinfo` style strings. > > Signed-off-by: Andrew Cooper > Acked-by: Wei Liu

[Xen-devel] [linux-linus test] 87701: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87701 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/87701/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254 test-amd64-amd64-xl

[Xen-devel] [ovmf test] 87722: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87722 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/87722/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543 test-amd64-amd64-xl-qemuu-ov

Re: [Xen-devel] [PATCH v4 22/26] tools/libxc: Expose the automatically generated cpu featuremask information

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:25PM +, Andrew Cooper wrote: > Signed-off-by: Andrew Cooper > Acked-by: Wei Liu Reviewed-by: Konrad Rzeszutek Wilk ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v4 21/26] tools/libxc: Use public/featureset.h for cpuid policy generation

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:24PM +, Andrew Cooper wrote: > Rather than having a different local copy of some of the feature > definitions. > > Modify the xc_cpuid_x86.c cpumask helpers to appropriate truncate the s/appropiate/appropiately/ ? > new values. > > As some of the feature have b

Re: [Xen-devel] [PATCH v4 20/26] tools/libxc: Modify bitmap operations to take void pointers

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:23PM +, Andrew Cooper wrote: > The type of the pointer to a bitmap is not interesting; it does not affect the > representation of the block of bits being pointed to. > > Make the libxc functions consistent with those in Xen, so they can work just > as well with 'u

Re: [Xen-devel] [PATCH v4 19/26] xen+tools: Export maximum host and guest cpu featuresets via SYSCTL

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:22PM +, Andrew Cooper wrote: > And provide stubs for toolstack use. > > Signed-off-by: Andrew Cooper > Acked-by: Wei Liu > Acked-by: David Scott > Acked-by: Jan Beulich > --- > CC: Tim Deegan You should also CC Daniel De Graaf.. > > v2: > * Rebased to use

Re: [Xen-devel] [PATCH v4 18/26] x86/domctl: Update PV domain cpumasks when setting cpuid policy

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:21PM +, Andrew Cooper wrote: > This allows PV domains with different featuresets to observe different values > from a native cpuid instruction, on supporting hardware. > > It is important to leak the host view of HTT and CMP_LEGACY through to guests, > even though

Re: [Xen-devel] [PATCH v4 17/26] x86/pv: Provide custom cpumasks for PV domains

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:20PM +, Andrew Cooper wrote: > And use them in preference to cpumask_defaults on context switch. HVM domains Extra space before HVM > must not be masked (to avoid interfering with cpuid calls within the guest), > so always lazily context switch to the host defaul

Re: [Xen-devel] [PATCH v4 16/26] x86/cpu: Context switch cpuid masks and faulting state in context_switch()

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:19PM +, Andrew Cooper wrote: > A single ctxt_switch_levelling() function pointer is provided > (defaulting to an empty nop), which is overridden in the appropriate > $VENDOR_init_levelling(). > > set_cpuid_faulting() is made private and included within > intel_ctx

Re: [Xen-devel] [PATCH v4 15/26] x86/cpu: Rework Intel masking/faulting setup

2016-03-28 Thread Konrad Rzeszutek Wilk
> + * Context switch levelling state to the next domain. A parameter of NULL is > + * used to context switch to the default host state, and is used by the > BSP/AP > + * startup code. > + */ > +static void intel_ctxt_switch_levelling(const struct domain *nextd) > +{ > + struct cpuidmasks *the

Re: [Xen-devel] [PATCH 3/6] xentrace: P2M lookup suport for ARM platform

2016-03-28 Thread Ben Sanda
Julien and George, Thank you for the comments. I had one question I wanted to ask. >A DOMID_XEN page could be read only too. For instance, the meta-data >of the trace buffer is read-only (see t_info), we don't want a domain >to be able to overwrite them. >However, all the foreign page are mapped

Re: [Xen-devel] [PATCH v4 14/26] x86/cpu: Rework AMD masking MSR setup

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:17PM +, Andrew Cooper wrote: > This patch is best reviewed as its end result rather than as a diff, as it > rewrites almost all of the setup. > > On the BSP, cpuid information is used to evaluate the potential available set > of masking MSRs, and they are uncondit

[Xen-devel] [PATCH v2] xen/arm64: check XSM Magic and Signature from the second unknown module.

2016-03-28 Thread fu . wei
From: Fu Wei This patch add a check_xsm_signature static function for detecting XSM from the second unknown module. If xen can't get the kind of module from compatible, we guess the kind of these first two unknown respectively: (1) The first unknown must be kernel; (2) The second unknown

Re: [Xen-devel] [PATCH v4 13/26] x86/cpu: Sysctl and common infrastructure for levelling context switching

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:16PM +, Andrew Cooper wrote: > A toolstack needs to know how much control Xen has over the visible cpuid > values in PV guests. Provide an explicit mechanism to query what Xen is > capable of. If it is only for PV, why don't you add that subops with that name? >

[Xen-devel] crash on boot with 4.6.1 on fedora 24

2016-03-28 Thread Michael Young
I get a crash on boot with my Fedora xen-4.6.1-3.fc24 packages. This seems to be related to how it is compiled because the same code compiled under Fedora 23 works. The boot logs are attached. The address mentioned in the crash has the code 0x82d08023d3c3 : je 0x82d08023e90a

Re: [Xen-devel] [PATCH v4 13/26] x86/cpu: Sysctl and common infrastructure for levelling context switching

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:16PM +, Andrew Cooper wrote: > A toolstack needs to know how much control Xen has over the visible cpuid > values in PV guests. Provide an explicit mechanism to query what Xen is > capable of. > > This interface will currently report no capabilities. This change

Re: [Xen-devel] [PATCH v4 12/26] x86/cpu: Move set_cpumask() calls into c_early_init()

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:15PM +, Andrew Cooper wrote: > Before c/s 44e24f8567 "x86: don't call generic_identify() redundantly", the > commandline-provided masks would take effect in Xen's view of the features. s/the// ? Or perhaps s/the/cpuid// ? > > As the masks got applied after the q

Re: [Xen-devel] [PATCH 1/6] Flask: Support for ARM xentrace

2016-03-28 Thread Ben Sanda
Konrad, > Modified to provide support for xentrace on the ARM platform. Added > flask credential to allow dom0 dom_xen mapping and write access for > trace buffers. >> >> So .. what does that mean? >> >> Is that something xentrace requests? Why is this ARM specific? >> Looking at xsm_sysctl and ho

[Xen-devel] [linux-mingo-tip-master test] 87700: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87700 linux-mingo-tip-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/87700/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 60684 test-amd64

Re: [Xen-devel] [PATCH v4 11/26] xen/x86: Improvements to in-hypervisor cpuid sanity checks

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:14PM +, Andrew Cooper wrote: > Currently, {pv,hvm}_cpuid() has a large quantity of essentially-static logic > for modifying the features visible to a guest. A lot of this can be subsumed > by {pv,hvm}_featuremask, which identify the features available on this > ha

Re: [Xen-devel] [PATCH v4 10/26] xen/x86: Improve disabling of features which have dependencies

2016-03-28 Thread Konrad Rzeszutek Wilk
On Wed, Mar 23, 2016 at 04:36:13PM +, Andrew Cooper wrote: > APIC and XSAVE have dependent features, which also need disabling if Xen > chooses to disable a feature. > > Use setup_clear_cpu_cap() rather than clear_bit(), as it takes care of > dependent features as well. > > Signed-off-by: And

Re: [Xen-devel] [PATCH v3 11/28] xen/x86: Clear dependent features when clearing a cpu cap

2016-03-28 Thread Konrad Rzeszutek Wilk
On Thu, Mar 17, 2016 at 07:56:32PM +, Andrew Cooper wrote: > On 17/03/16 19:51, Konrad Rzeszutek Wilk wrote: > > On Tue, Mar 15, 2016 at 03:35:07PM +, Andrew Cooper wrote: > >> When clearing a cpu cap, clear all dependent features. This avoids having > >> a > >> featureset with intermedia

Re: [Xen-devel] [PATCH 2/2] tools: detect appropriate debug optimization level

2016-03-28 Thread Doug Goldstein
On 3/16/16 2:14 PM, Doug Goldstein wrote: > On 3/8/16 10:50 AM, Wei Liu wrote: >> On Tue, Mar 08, 2016 at 10:34:42AM -0600, Doug Goldstein wrote: >>> On 3/8/16 9:38 AM, Wei Liu wrote: On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote: > The build should not use -O0 as that res

Re: [Xen-devel] [PATCH v2 2/3] libxl: add new pvusb backend "qusb" provided by qemu

2016-03-28 Thread Konrad Rzeszutek Wilk
On Tue, Mar 22, 2016 at 08:29:22AM +0100, Juergen Gross wrote: > Add a new pvusb backend type "qusb" which is provided by qemu. It can > be selected either by specifying the type directly in the configuration > or it is selected automatically by libxl in case there is no "usbback" > driver loaded.

Re: [Xen-devel] [PATCH v2 3/3] libxl: add domain config parameter to force start of qemu

2016-03-28 Thread Konrad Rzeszutek Wilk
On Tue, Mar 22, 2016 at 08:29:23AM +0100, Juergen Gross wrote: > Today the device model (qemu) is started for a pv domain only in case > a device requiring qemu is specified in the domain configuration > (qdisk, vfb, channel). If there is no such device the device model > isn't started and hence it

Re: [Xen-devel] [PATCH v2 2/4] ns16550: enable Pericom controller support

2016-03-28 Thread Konrad Rzeszutek Wilk
On Tue, Mar 22, 2016 at 07:19:49AM -0600, Jan Beulich wrote: > Other than the controllers supported so far, multiple port Pericom > boards map all of their ports via BAR0, which requires a number of > adjustments: Instead of tracking "max_bars" we now flag whether all > ports use BAR0, and whether

[Xen-devel] [libvirt test] 87702: tolerable FAIL - PUSHED

2016-03-28 Thread osstest service owner
flight 87702 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/87702/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-qcow2 11 migrate-support-checkfail never pass test-armhf-armhf-libvirt-qcow2 13 guest-sav

[Xen-devel] [linux-4.1 test] 87692: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87692 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/87692/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 3 host-install(3) broken in 87395 REGR. vs. 66399 build-amd64-rumpuserxen

Re: [Xen-devel] [PATCH v8 3/3] VT-d: Fix vt-d Device-TLB flush timeout issue

2016-03-28 Thread Konrad Rzeszutek Wilk
> > > > +list_del(&pdev->domain_list); > > > +pdev->domain = NULL; > > > +pci_hide_existing_device(pdev); > > > +break; > > > +} > > > +} > > > + > > > +pcidevs_unlock(); > > > + > > > +if ( !is_hardware_domain(d) ) > > > +

Re: [Xen-devel] Changing the CPUID hypervisor string for HVM DomU

2016-03-28 Thread Boris Ostrovsky
On 03/28/2016 05:34 AM, Fanny Dwargee wrote: Hi, I'm currently using Xen v4.6.1 compiled from sources on Linux Debian Jessie and I would like to change the CPUID hypervisor vendor string when queried from a HVM DomU (Windows7 SP1 64 bits). According to http://www.sandpile.org/x86/cpuid.htm#l

Re: [Xen-devel] [PATCH v8 1/3] VT-d: Reduce spin timeout to 1ms, which can be boot-time changed

2016-03-28 Thread Konrad Rzeszutek Wilk
On Mon, Mar 28, 2016 at 06:27:21AM +, Xu, Quan wrote: > On March 26, 2016 4:07am, Konrad Rzeszutek Wilk > wrote: > > On Thu, Mar 24, 2016 at 01:57:58PM +0800, Quan Xu wrote: > > > > Hey! > > > > Thanks for the patch! > > > > I see that you have __must_check.. > > > > But if you check the

Re: [Xen-devel] pv-grub guest booting fail with recent qemu-xen

2016-03-28 Thread Konrad Rzeszutek Wilk
On Mon, Mar 28, 2016 at 02:03:35AM +, Hao, Xudong wrote: > > -Original Message- > > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Konrad > > Rzeszutek Wilk > > Sent: Saturday, March 26, 2016 2:58 AM > > To: Hao, Xudong > > Cc: stefano.stabell...@eu.citrix.com; x

[Xen-devel] Changing the CPUID hypervisor string for HVM DomU

2016-03-28 Thread Fanny Dwargee
Hi, I'm currently using Xen v4.6.1 compiled from sources on Linux Debian Jessie and I would like to change the CPUID hypervisor vendor string when queried from a HVM DomU (Windows7 SP1 64 bits). According to http://www.sandpile.org/x86/cpuid.htm#level_4000_h this information is queried via EA

[Xen-devel] [xen-unstable test] 87625: regressions - FAIL

2016-03-28 Thread osstest service owner
flight 87625 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/87625/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-pair 21 guest-migrate/src_host/dst_host fail REGR. vs. 86491 test-amd64-i3

Re: [Xen-devel] [PATCH v8 3/3] VT-d: Fix vt-d Device-TLB flush timeout issue

2016-03-28 Thread Xu, Quan
+cc Konrad Rzeszutek Wilk , who is also reviewing this patch. On March 24, 2016 11:38pm, Dario Faggioli wrote: > On Thu, 2016-03-24 at 13:57 +0800, Quan Xu wrote: > > If Device-TLB flush timed out, we would hide the target ATS device and > > crash the domain owning this ATS device. If impacted d